Core Primitive
Ongoing unresolved issues create constant background energy drain even when you are not thinking about them.
The invisible tax on everything you do
You have spent the last eleven lessons building an increasingly precise model of energy: what it is (Energy is a more fundamental resource than time), its multiple dimensions (Energy has multiple dimensions), how to audit it (Energy auditing), how it follows biological rhythms (Energy follows ultradian rhythms), how to match it to demand (Peak energy for peak work), how to recover it (Recovery is not laziness), and how it is shaped by sleep (Sleep is the foundation of energy management), movement (Movement generates energy), nutrition (Nutrition affects cognitive energy directly), social interaction (Social energy management), and the cost of switching between tasks (The energy cost of context switching). Each lesson has added a layer of visibility to the energy system you operate within. This lesson addresses something different: not a category of energy expenditure but a structural flaw in the system itself.
Energy leaks are ongoing, unresolved issues that create constant background drain on your cognitive and emotional resources even when you are not consciously attending to them. They are the cracked pipe in the basement — invisible most of the time, but continuously siphoning away water that should be available for the shower, the sink, the garden. You do not notice the leak. You notice the low pressure everywhere else.
Your available energy is not just determined by what you are actively doing. It is determined by the sum total of everything you have left undone. And that sum, for most people, is staggeringly large.
The science of unfinished business
In 1927, Bluma Zeigarnik, a Lithuanian-Soviet psychologist studying under Kurt Lewin at the University of Berlin, demonstrated that people remember incomplete tasks roughly twice as well as completed ones. The implication was profound: your cognitive system maintains an active representation of every unfinished task, keeping it loaded and accessible like a background process on a computer — consuming resources even when no user is actively interacting with it. Kenneth McGraw and Jirina Fiala (1982) later showed the effect is strongest when you expect to return to the task, and weakest when the interruption seems permanent. The more personally significant the uncompleted task, the stronger the persistent memory trace.
This is an adaptive system. A forager tracking three or four ongoing tasks benefits from persistent memory traces. A knowledge worker carrying forty-seven unresolved items — the email, the tax filing, the dental appointment, the broken appliance, the difficult conversation, the overdue report, the expiring passport — is running that adaptive system far past its design parameters. Each open loop is a background process. Forty-seven background processes do not just slow the system. They degrade its capacity to do foreground work.
David Allen's Getting Things Done methodology translates this into a practical framework. Allen calls these items "open loops" and argues that your mind is for having ideas, not for holding them. Every open loop generates what he calls "psychic RAM usage" — your brain allocates working memory to track the item and generates periodic reminders in the form of intrusive thoughts. His solution is the "mind sweep": externalize every open loop into a trusted system, then define the next physical action for each. The key insight is cognitive, not organizational: capturing an open loop and defining its next action closes the Zeigarnik loop. Your brain releases the item from active monitoring.
Masicampo and Baumeister confirmed this experimentally in 2011. Unfulfilled goals intruded on unrelated tasks and degraded performance. But participants who made specific plans for their unfulfilled goals showed no such interference — making a plan was as effective as completing the goal in eliminating the background cognitive noise. You do not have to resolve every open loop to reclaim the energy it consumes. You have to either resolve it, plan it, or consciously release it. Each action closes the loop. Each one stops the drain.
Executive coach Thomas Leonard introduced a complementary concept in the 1990s: "tolerations" — persistent conditions you have adapted to but not resolved. The kitchen faucet that drips, the colleague who takes credit for your work, the desk that is too small, the subscription you forgot to cancel. Tolerations are insidious because they never feel urgent. Nobody declares an emergency over a dripping faucet. But every time you encounter one, your brain registers the open loop — "I should fix that" — and expends a small quantum of energy processing the reminder and the guilt. One dripping faucet is trivial. Thirty tolerations running simultaneously produce a cumulative drain that is anything but trivial. Leonard found that clients who eliminated their top tolerations experienced dramatic increases in available energy and creativity — individually trivial fixes that collectively freed up an astonishing amount of background cognitive capacity.
The taxonomy of energy leaks
Not all leaks are the same. Understanding the categories helps you triage.
Undone tasks are the most obvious: things you have committed to doing that remain incomplete. The unfiled paperwork, the unanswered email, the appointment you need to schedule. Each one creates a classic Zeigarnik loop. These are typically the easiest leaks to fix — the resolution is clear, the only barrier is execution.
Unresolved decisions are more costly per unit because the brain cannot plan the next action without first resolving the decision. Should you take the job offer or stay? Should you confront your partner or let it go? Each unresolved decision generates not just a single open loop but a branching tree of contingent loops, and your brain attempts to maintain active representations of multiple branches simultaneously. A single unresolved decision can exceed the cognitive cost of ten undone tasks.
Broken agreements combine the cognitive cost of an open loop with the emotional cost of guilt and shame. You told your friend you would help them move and did not show up. You committed to a deadline and missed it without communicating. Each broken agreement is an active wound to your self-concept and relational integrity, generating emotional processing on top of cognitive monitoring.
Environmental tolerations are the physical-world leaks: the cluttered desk, the broken appliance, the room that needs painting. Low-intensity but persistent — you encounter them daily, and each encounter triggers a micro-recognition that costs almost nothing in isolation and everything in aggregate.
Relational tolerations are the interpersonal leaks: the conversation you are avoiding, the boundary you need to set, the relationship that has drifted into obligation. These are often the highest-cost leaks because they combine cognitive monitoring with emotional processing and social complexity.
Identity tolerations are the deepest category: the misalignment between who you are and how you are living. The career that does not match your values. The version of yourself you present to the world that differs from who you actually are. These do not resolve through a single action — they require structural change. But failing to even acknowledge them consumes enormous background energy in the form of cognitive dissonance and the ongoing effort of maintaining a facade.
Why each individual leak feels negligible but the aggregate is crushing
The challenge is that each leak fails to cross the threshold of urgency that would trigger action. The dripping faucet is not a crisis. The unanswered email is not an emergency. And so people tolerate them.
But John Sweller's cognitive load theory demonstrates that when total cognitive demand approaches working memory capacity, performance degrades catastrophically — not linearly. The difference between operating at 70 percent of capacity and 95 percent is not a 25 percent performance drop. It is the difference between fluid, strategic thinking and fragmented, reactive, error-prone thinking. A handful of leaks might reduce your capacity from 100 to 85 percent. Twenty or thirty leaks push you past the threshold into a fundamentally degraded cognitive state.
This explains a phenomenon many people experience but cannot account for: the sense that they should be more productive than they are given their available time. They look at their calendar and see open blocks. They have had adequate sleep and reasonable nutrition. And yet they feel heavy, scattered, unable to engage at full capacity. The problem is not what is on their calendar. It is the invisible load of dozens of unresolved issues that never appear on any task list but collectively consume the bandwidth that would otherwise be available for the work that does.
The leak audit: making the invisible visible
The first step in managing energy leaks is the same first step you have applied throughout this phase: make the invisible visible. You cannot manage what you cannot see.
The leak audit is a structured version of Allen's mind sweep, augmented with Leonard's tolerations framework and calibrated for energy cost rather than task priority. You are not asking "What do I need to do?" — that is a productivity question. You are asking "What is draining my energy without my explicit consent?" — that is a sovereignty question.
Set aside twenty to thirty minutes. Write down every unresolved issue you can identify, organized by the taxonomy above: undone tasks, unresolved decisions, broken agreements, environmental tolerations, relational tolerations, and identity tolerations. Do not filter or prioritize. If it occurs to you, it is occupying cognitive space, and it belongs on the list.
Most people produce a list of between twenty and sixty items. The length is itself informative. When you see forty-three unresolved issues in front of you — items previously distributed across dozens of mental compartments, each one individually ignorable — the cumulative weight becomes visible. This is what you have been carrying.
Once the list exists, rate each item for background cognitive cost on a 1-to-5 scale (1 = rarely think about it; 5 = generates daily guilt or anxiety). Then estimate the effort to close the loop — not to fully solve the issue, but to take the next action. Sometimes that is completing the task. Sometimes it is making a plan. Sometimes it is consciously accepting the situation. The highest-value leaks are those with high cognitive cost and low resolution effort: the email that takes five minutes but has generated two weeks of guilt, the appointment that requires one phone call but has occupied your mental periphery for a month.
Why leaks persist and how they connect to zombie commitments
If many leaks are easy to resolve, why do they persist? Because the resolution involves a moment of discomfort that the avoidance impulse consistently dodges. The email is not hard to write — it is uncomfortable because it means admitting you dropped the ball. The conversation is not logistically complex — it is emotionally complex because it involves vulnerability.
The avoidance calculation makes sense in any single moment: "I'll deal with it later, and right now I feel fine." But the calculation fails to account for the cumulative cost across all the moments between now and resolution. That uncomfortable email costs five minutes to write and thirty seconds of discomfort. Avoiding it for two weeks costs fourteen days of background cognitive drain — an aggregate expenditure that dwarfs the fix. This is temporal discounting with the same structure as financial debt. The interest compounds in cognitive currency. The longer you avoid, the more depleted you become, which makes the discomfort feel proportionally larger, which reinforces the avoidance. The leak feeds itself.
The most expensive variant of this pattern is the zombie commitment — a concept from The commitment budget. Zombie commitments are things you said yes to but have neither completed nor officially released. The gym membership you are paying for but not using. The book project you announced but have not touched in six months. Each zombie combines the cognitive cost of an open Zeigarnik loop with the emotional cost of a broken agreement and the identity cost of cognitive dissonance between who you committed to being and who you are actually being. It will remain a drain until you either resurrect the commitment and begin executing, or formally release it and close the loop. The commitment budget exercise from The commitment budget likely surfaced some of these zombies. This lesson asks you to look at them through the energy lens: not "can I fit this in my schedule?" but "what is this costing me every day that I neither do it nor release it?"
AI as a leak detection system
Energy leaks are difficult to identify from the inside because they operate below conscious attention. You notice the aggregate — the inexplicable heaviness, the reduced capacity — but not the individual contributors. This makes leak detection an ideal application for AI assistance.
An AI configured as a leak detection partner can prompt you through the audit more thoroughly than self-directed reflection achieves, asking probing questions across each category: "What physical spaces are you tolerating?" "What conversations have you been avoiding?" "What commitments have you been quietly failing at?" It can maintain the list across sessions, tracking which leaks you have resolved and which persist.
Over time, the AI can identify your leak patterns. Perhaps you consistently accumulate relational tolerations because you avoid conflict. Perhaps your undone tasks cluster around a specific domain — administrative, health, financial — that points to a systematic avoidance pattern. These patterns are invisible from the inside. An AI reviewing your leak data across weeks can surface them as specific, actionable observations and serve as an accountability mechanism for resolution: "You identified that email as a high-priority leak on Tuesday. Have you sent it?" This is not nagging. It is closing the meta-loop — ensuring that leak resolution itself does not become another open loop.
From identification to repair
Identifying your energy leaks is necessary. It is not sufficient. The next lesson, Fixing energy leaks, is dedicated entirely to the systematic process of fixing leaks — the prioritization frameworks, the resolution strategies, the maintenance practices that prevent new leaks from accumulating as fast as you close old ones.
But identification itself is not nothing. The Zeigarnik research consistently shows that acknowledging an open loop and defining a plan for it — even before executing the plan — reduces the background drain. Writing down your leaks, rating them, and identifying the five you will address this week closes some loops before you take action. Your brain, having externalized the tracking to a list you trust, begins to release the background monitoring.
This is the energy management equivalent of placing a bucket under a leak before you call the plumber. The leak is still there. The repair has not happened. But the damage is contained, the situation is visible, and the next action is defined. That transition — from invisible background drain to visible, triaged, planned resolution — is itself an energy intervention.
Start with the audit. Name the leaks. Feel the weight of the full list and recognize that this is what you have been carrying. Then pick the five easiest, highest-return items and close them this week. The cumulative effect will be larger than you expect — not because any single leak matters that much, but because your cognitive system, freed from maintaining dozens of background monitoring processes, can redirect that capacity to the foreground work that actually matters. The energy was always there. It was just leaking.
Frequently Asked Questions